Suggested Categories:

Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Data Catalog Software
Data catalog software is a tool used to organize, manage, and provide easy access to an organization's data assets. It helps businesses create a centralized inventory of all available data, such as databases, datasets, reports, and documents, allowing users to search, classify, and understand their data assets more efficiently. Features often include metadata management, data lineage tracking, data governance, collaboration tools, and integration with data management systems. By providing a clear overview of data sources and their relationships, data catalog software facilitates data discovery, improves data quality, ensures compliance, and enhances collaboration across teams.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    Foretrace

    Foretrace

    Foretrace

    ...Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail organizations or damage their reputations. Metadata is exposed in almost any document or file that is created and is rarely removed before sharing files. This metadata is used by attackers for targeted phishing and malware attacks. Discovered or stolen corporate data and credentials are sold and exchanged on criminal and dark web forums, resulting in easy access for attackers and potential damage to an organization’s reputation.
  • 2
    TikBox

    TikBox

    TikBox

    ...In-house legal teams can create custom agreements or integrate existing ones into the contract builder, ensuring colleagues in various functions have access to appropriate contractual arrangements. Our multi-layered encryption ensures the integrity of your copyright & provenance metadata & labels. This safeguards your data against manipulation & secures your licensing revenue streams. TikBox is pioneering an online ecosystem tailored for digital content creators to assert copyrights, embed provenance details, and unlock new revenue streams from their online assets. Our platform is designed to seamlessly integrate copyright and provenance-related metadata into your digital creations, safeguarding them across the internet.
    Starting Price: $5.84 per month
  • 3
    ISEEK

    ISEEK

    XtremeForensics

    ...Once ISEEK has been used to pinpoint the required data and reduce the volume for further review it enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. These formats include generic load files and a Relativity-specific load file.
  • 4
    NETSCOUT Omnis Security
    ...Threat detection with selected intelligence, behavioral analytics, open source data, and advanced statistics. Contextual threat detection and investigation using a robust source of metadata and packages. Automated edge blocking with the best stateless packet processing technology, or third-party blocking devices.
  • 5
    Falcon Cloud Workload Protection
    Falcon Cloud Workload Protection provides complete visibility into workload and container events and instance metadata enabling faster and more accurate detection, response, threat hunting and investigation, to ensure that nothing goes unseen in your cloud environment. Falcon Cloud Workload Protection secures your entire cloud-native stack, on any cloud, across all workloads, containers and Kubernetes applications. Automate security and detect and stop suspicious activity, zero-day attacks, risky behavior to stay ahead of threats and reduce the attack surface. ...
  • 6
    GigaSECURE

    GigaSECURE

    Gigamon

    ...GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed.
  • 7
    Trellix Network Security
    ...Improve analyst efficiency with high-fidelity alerts that trigger when it matters most, saving time and resources and reducing alert volume and fatigue. Generate concrete real-time evidence and Layer 7 metadata to provide further security context to pivot to investigation and alert validation, endpoint containment, and incident response. Detect multi-flow, multi-stage, zero-day, polymorphic, ransomware, and other advanced attacks with signature-less threat detection. Detect known and unknown threats in real-time while also enabling back-in-time detection of threats. ...
  • 8
    Yandex Lockbox
    ...Secrets are only stored in encrypted form. You can choose pre-configured service roles to ensure granular access to your secrets. Set up access permissions to read or manage your secret or its metadata. Create a secret, select a Key Management Service (KMS) key, and securely store your login-password pairs and other sensitive information. A secret may contain any of your confidential information, e.g. a login-password pair, server certificate keys, or cloud service account keys. Each secret stored by the service can have multiple versions of stored data. ...
    Starting Price: $0.0277 per 10000 operations
  • 9
    CredoLab

    CredoLab

    CredoLab

    Help your risk, fraud, and marketing teams make better decisions with advanced behavioral analytics based on smartphone and web metadata. Join 150+ financial companies, banks, and fintech unicorns already using CredoLab platform to enrich their data and unlock revenue opportunities for sustainable growth and innovation. Designed to be seamlessly embedded into your products, providing unparalleled real-time data-driven solutions for your business needs. Greater predictive power, 100% hit rate, lower cost of risk, higher approval rate. ...
    Starting Price: $600 per month
  • 10
    Normalyze

    Normalyze

    Normalyze

    ...We support all native cloud data stores, structured or unstructured, across all three clouds. Normalyze scans both structured and unstructured data within your cloud accounts and only collects metadata to add to the Normalyze graph. No sensitive data is collected at any point during scanning. Display a graph of access and trust relationships that includes deep context with fine-grained process names, data store fingerprints, IAM roles and policies in real-time. Quickly locate all data stores containing sensitive data, find all-access paths, and score potential breach paths based on sensitivity, volume, and permissions to show all breaches waiting to happen. ...
    Starting Price: $14,995 per year
  • 11
    Sentra

    Sentra

    Sentra

    ...Automatically detect all managed and unmanaged cloud-native data stores. Sentra uses both existing and custom data recognition tools to identify sensitive cloud data. By leveraging data scanning technologies that are based on smart metadata clustering and data sampling, users can reduce cloud costs by three orders of magnitude compared to existing solutions. Sentra’s API-first and extensible classification easily integrates with your existing data catalogs and security tools. Assess the risk to your data stores by looking both at compliance requirements and your security posture. ...
  • 12
    OpenText CloudAlly Backup
    ...With unlimited retention, granular restore options, and point-in-time recovery, organizations can rapidly recover from malware, human error, sync issues, or outages. CloudAlly’s backup services include full metadata preservation and support for advanced use cases such as sandbox seeding and anomaly detection. Built with strong security standards—AES 256-bit encryption, MFA, Okta/OAuth authentication, HIPAA/GDPR compliance, and ISO certifications—the platform ensures data protection that meets global regulatory requirements. Trusted by more than 30,000 organizations, CloudAlly simplifies SaaS data protection while delivering cost savings.
    Starting Price: $3.00/month
  • Previous
  • You're on page 1
  • Next